Hey everyone,
I have some security concerns about the 5800 series switches I am using. Specifically I want to talk about managing them. I have a few different models of 5800 in my environment. The most prevelant being the JG225A models (48 port, 19" deep, with a management port).
I am currently using the management port to ssh to these devices. A few of the devices are designated as DMZ switches. In my mind, a management port is a port that's dedicated to only management traffic. Since these are designated as "management" ports in the event they are compromised in the DMZ, would it be possible for an attacker to gain access to the management interface to piggy back into my production network from said port?
In my network topology, if one did compromise the DMZ switches, without the management port, the attacker would have to circumvent both my firewall system and my IPS to gain access to my internal network.
I can't seem to find much documentation about the management ports. My googlefu is weak on this subject. I guess my real questions are: Is the management port on the 5800AF-48G (JG225A) an out of band management port? Does it create a security concern if I have this management port plugged into my core internal network, while the 48 ports manage the DMZ (assume DMZ is partitions from the internal network via a Firewall and IPS but the management port plugs directly into the core)?